Learn to hack: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
No edit summary
No edit summary
Line 6: Line 6:
* https://www.hoppersroppers.org/training.html
* https://www.hoppersroppers.org/training.html
* https://tryhackme.com/
* https://tryhackme.com/
* https://overthewire.org/wargames/


Resources that assume minimal tech background:
Resources that assume minimal tech background:
Line 42: Line 43:
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/
* leaked conti ransomware playbook: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf


=== Tools ===
=== Tools ===
Line 106: Line 108:
* https://github.com/dafthack/MSOLSpray
* https://github.com/dafthack/MSOLSpray
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/
== Scanning and Recon ==
* https://github.com/robertdavidgraham/masscan
* https://www.shodan.io/
* https://www.zoomeye.org/


== Opsec ==
== Opsec ==
Line 112: Line 119:
* https://tails.boum.org/
* https://tails.boum.org/
* The whonix wiki has lots of great info on anonymity even if you're not using whonix: https://www.whonix.org/wiki/Documentation
* The whonix wiki has lots of great info on anonymity even if you're not using whonix: https://www.whonix.org/wiki/Documentation
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy
* https://veracrypt.fr/
* https://veracrypt.fr/

Revision as of 02:37, 22 December 2021

This page aims to compile high quality resources for hackers. All books listed on this page can be found on Library Genesis and Z-Library

General Resources

Resources that assume little to no background knowledge:

Resources that assume minimal tech background:

  • (book) Penetration Testing: A Hands-On Introduction to Hacking

Resources that assume a tech or hacking background:

Practice labs:

General references:

Active Directory

Tools

Office 365 & Azure

Tools

GSuite

https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite

C2 Frameworks

Antivirus & EDR Evasion

Initial Access

Phishing

Password spraying

Scanning and Recon

Opsec